General

  • Target

    input-05.010.2021.doc

  • Size

    46KB

  • Sample

    210510-8lv88y78ae

  • MD5

    fda16205c8785e34795dd7b8ed314e01

  • SHA1

    338961a0ae250057b5d263495a1217e3146e57b8

  • SHA256

    ad0df2dfd749f0d84f7fc56204e1001307183575ebb488d99fcf4da7a46a8ef6

  • SHA512

    9f072e64ab79400b088fdd45c674e627eb3cc6b16d0d0bbbd53b6932add893c138c855eb7a2da357ba6f2a2683c21ede25e1a64f3fde29f17811569462d58769

Score
10/10

Malware Config

Targets

    • Target

      input-05.010.2021.doc

    • Size

      46KB

    • MD5

      fda16205c8785e34795dd7b8ed314e01

    • SHA1

      338961a0ae250057b5d263495a1217e3146e57b8

    • SHA256

      ad0df2dfd749f0d84f7fc56204e1001307183575ebb488d99fcf4da7a46a8ef6

    • SHA512

      9f072e64ab79400b088fdd45c674e627eb3cc6b16d0d0bbbd53b6932add893c138c855eb7a2da357ba6f2a2683c21ede25e1a64f3fde29f17811569462d58769

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks